Information Security and Privacy

24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings

  • Julian Jang-Jaccard
  • Fuchun Guo
Conference proceedings ACISP 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11547)

Also part of the Security and Cryptology book sub series (LNSC, volume 11547)

Table of contents

  1. Front Matter
    Pages i-xiv
  2. Encryption

    1. Front Matter
      Pages 1-1
    2. Jongkil Kim, Willy Susilo, Joonsang Baek, Surya Nepal, Dongxi Liu
      Pages 3-20
    3. Tran Viet Xuan Phuong, Willy Susilo, Guomin Yang, Jun Yan, Dongxi Liu
      Pages 21-38
    4. Yunhao Ling, Sha Ma, Qiong Huang, Ru Xiang, Ximing Li
      Pages 39-57
    5. Alex Davidson, Amit Deo, Ela Lee, Keith Martin
      Pages 58-77
    6. Tim van de Kamp, David Stritzl, Willem Jonker, Andreas Peter
      Pages 97-115
  3. Post-quantum Security

    1. Front Matter
      Pages 117-117
    2. Arnaud Sipasseuth, Thomas Plantard, Willy Susilo
      Pages 119-137
    3. Dung Hoang Duong, Kazuhide Fukushima, Shinsaku Kiyomoto, Partha Sarathi Roy, Willy Susilo
      Pages 138-155
    4. Wilson Alberto Torres, Veronika Kuchta, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Jacob Cheng
      Pages 156-175
    5. Li-Ping Wang, Jingwei Hu
      Pages 176-191
    6. Michael Kraitsberg, Yehuda Lindell, Valery Osheter, Nigel P. Smart, Younes Talibi Alaoui
      Pages 192-210
    7. Terry Shue Chien Lau, Chik How Tan
      Pages 211-228
    8. Nan Cui, Shengli Liu, Yunhua Wen, Dawu Gu
      Pages 229-250
    9. Sean Murphy, Rachel Player
      Pages 251-268
  4. Cryptocurrency Related

    1. Front Matter
      Pages 269-269
    2. Shuyang Tang, Sherman S. M. Chow, Zhiqiang Liu, Joseph K. Liu
      Pages 271-288
    3. Lin Zhong, Huili Wang, Jan Xie, Bo Qin, Joseph K. Liu, Qianhong Wu
      Pages 289-306
    4. Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu
      Pages 307-321
    5. Ziyu Wang, Jianwei Liu, Zongyang Zhang, Yanting Zhang, Jiayuan Yin, Hui Yu et al.
      Pages 322-339
  5. Foundations

    1. Front Matter
      Pages 341-341
    2. Ryo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda et al.
      Pages 343-361
    3. Atsunori Ichikawa, Wakaha Ogata, Koki Hamada, Ryo Kikuchi
      Pages 362-380
    4. Willy Susilo, Joseph Tonien, Guomin Yang
      Pages 381-398
    5. Lucas Schabhüser, Denis Butin, Johannes Buchmann
      Pages 399-418
    6. Geng Li, Jianwei Liu, Zongyang Zhang
      Pages 419-437
  6. System and Network Security

    1. Front Matter
      Pages 439-439
    2. Wei Zong, Yang-Wai Chow, Willy Susilo
      Pages 441-455
    3. Timothy Curry, Devon Callahan, Benjamin Fuller, Laurent Michel
      Pages 456-474
    4. Liang Zheng, Donglei Han, Zongbin Liu, Cunqing Ma, Lingchen Zhang, Churan Tang
      Pages 475-493
    5. Jaryn Shen, Timothy T. Yuen, Kim-Kwang Raymond Choo, Qingkai Zeng
      Pages 514-532
    6. Xiaojian Pang, Li Yang, Maozhen Liu, Jianfeng Ma
      Pages 533-551
  7. Symmetric Cryptography

  8. Short Papers

    1. Front Matter
      Pages 607-607
    2. Weixuan Li, Wei Yu, Bao Li, Xuejun Fan
      Pages 620-629
    3. Xuejun Fan, Song Tian, Bao Li, Weixuan Li
      Pages 630-638
    4. Yaoan Jin, Atsuko Miyaji
      Pages 639-650
    5. Yi-Ting Huang, Yu-Yuan Chen, Chih-Chun Yang, Yeali Sun, Shun-Wen Hsiao, Meng Chang Chen
      Pages 660-668
    6. Dunming Li, Jenwen Mao, Fuke Shen
      Pages 669-678
    7. Woojoong Ji, Taeyun Kim, Kuyju Kim, Hyoungshick Kim
      Pages 679-686
  9. Back Matter
    Pages 687-688

About these proceedings


This book constitutes the refereed proceedings of the 24th Australasian Conference on Information Security and Privacy, ACISP 2019, held in Christchurch, New Zealand, in July 2019.
The 32 revised full papers and 8 short papers presented were carefully revised and selected from 129 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as encryption; post-quantum security; cryptocurrency related; foundations; system and network security; and symmetric cryptography.


cryptography formal methods and theory of security security services intrusion/anomaly detection and malware mitigation systems security network security database and storage security software and application security human and societal aspects of security and privacy security in hardware authentication ciphertexts computer crime computer science encryption public key cryptography semantics software engineering structural design

Editors and affiliations

  1. 1.Massey UniversityPalmerston NorthNew Zealand
  2. 2.University of WollongongWollongongAustralia

Bibliographic information

Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment